ASC Security Statement

The most advanced security technologies to ensure securely managed contracts, documents and data

Advanced Server Authentication and Data Encryption

Advanced Software Concepts (ASC) uses the most advanced technology for Internet security available today. When you login to your hosted and managed service using your preferred browser (Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari), Secure Socket Layer (SSL) technology protects your contracts and other information using both server authentication and data encryption.

This approach ensures that your contracts, documents and data are safe, secure and only available to registered and authenticated users within your organization. Your data is completely inaccessible to your competitors and any other unauthorized, unauthenticated users.

User Authentication

ASC provides each designated user in your organization with a unique user name and password that must be entered each time the user logs into the site. At login, a session "cookie" is issued only to record encrypted authentication information for the duration of that specific session.

The session "cookie" does not include either the username or password of the user. ASC does not use cookies to store other confidential user and session information, but instead implements more advanced security methods based on dynamic data and encoded session IDs.

Secure Server Environment for Hosted Solutions

In addition, for customers using our hosted and managed service, each unique customer sub-domain in our ASC solutions network is hosted in a secure server environment that uses a firewall and other advanced technology to prevent interference or access from outside intruders.

Our data centers are SAS 70 and SSAE 16 compliant. All reasonable precautions are taken to ensure that your personal information is kept safe from loss, unauthorized access, modification or disclosure.

Data center safeguards include:

  • Premises security, with badge access to all facilities and iris scanners to server farm
  • Restricted access to the contract, document and data storage area
  • Authorized access to digital data, using the latest technological means, including, but not limited to, firewalls, certificates, and security software
  • Data redundancy and fire suppression measures
  • Among many other security measures

Expert Security Team

The security team comprising internal and external security experts meets on a regular basis to discuss current and potential threats and to determine actions and deliverables to further enhance the security of our systems. In addition, all employment agreements include security responsibilities.

Documented procedures and company culture result in the timely reporting of security incidents to the IT security coordinator to ensure prompt corrective action.

More Information

For more information about ASC's advanced data security measures, please contact us.

  • Follow Us

  • Facebook
  • Twitter
  • Linkedin
  • YouTube

We use cookies to provide you with the best possible experience and to help us better understand how our site is used. We take the protection of your personal data very seriously.
Please see our Privacy Policy for more details. By continuing to use this site, you consent to our use of cookies.